Paper Title:
A Comprehensive Agent-Based Safety Solution Meeting the Controllable Work System
  Abstract

This paper proposes and implements a comprehensive software system based on agents and mobile agents techniques, which firstly deals with the network admission control and authorization, adopting the traditional password authentication schema and an intelligent, flexible sensor whose kernel is the NDIS-hooking driver. Agent Message Protocol over UDP/TCP is proposed to secure and encrypt the communication data among stationary agents and server components, which eradicates malicious codes embedded or spread in the internal network. In order to avoid the above software agents mangled or destroyed, the proactive method of Grid Scanning model based on the Agent Message Protocol and Address Resolution Protocol can detect and spoof those clients whose agents are mangled; and if the users forge the logon info, this system can prevent the clients escaping from the control with the dual verification mechanism. Finally, the mobile agent infrastructure with flexible and effortless integration with this security system is introduced and implemented, which supports security access to resources on the controllable clients. Such solution in the internal network satisfies the security-related requirements of availability, expansibility, responsibility, and self-defense, as well as the non-security-related requirements of real-time, veracity, stability and flexibility.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
1493-1498
DOI
10.4028/www.scientific.net/KEM.467-469.1493
Citation
J. L. Zhou, "A Comprehensive Agent-Based Safety Solution Meeting the Controllable Work System", Key Engineering Materials, Vols. 467-469, pp. 1493-1498, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Shao Feng Lin, Xiao Peng Li
Chapter 3: Control Engineering, Monitoring and Control System
Abstract:In the network security monitoring system, it is important to trace information source timely and accurately, which is an important way to...
319
Authors: Shao Feng Lin, Wei Feng Sun, Lin Na Fan, Hua Wang
Chapter 4: Computational Methods and Algorithms, Applied Information Technologies
Abstract:The LAN usually hides internal network structure by NAT to share a public IP address in the internal network, and thus it is hard to locate...
2881
Authors: Ru Yang
Chapter 2: Manufacturing Technologies and Application
Abstract:Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the...
191
Authors: Jun Zhao, Li Qiang Dong, Mu Shun Yang, Ya Guo, Xian Zhen Zhuang
Chapter 7: Communication and Information Technologies, Algorithms and Numerical Methods of Data Processing
Abstract:Honeypot is a kind of active safety technology. New honeypot system is built, operating system camouflage,camouflage IP address, the routing...
1796